0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (8)
  • R100 - R250 (182)
  • R250 - R500 (704)
  • R500+ (11,124)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > General

Digital Macro & Close-up Photography (Paperback, 2nd Ed.): Ross Hoddinott Digital Macro & Close-up Photography (Paperback, 2nd Ed.)
Ross Hoddinott
R383 Discovery Miles 3 830 Ships in 12 - 17 working days

See the world from a totally new viewpoint with this comprehensive guide to close-up and macro photography. From guidance on choosing cameras, lenses and accessories, to advice on lighting,exposure, shutter speed, composition and post-production techniques, this book provides everything you need to create stunning images of insects, reptiles and wildflowers, as well as the inspiration to look at ordinary objects from an entirely new angle. You don't need to invest in expensive kit to start taking impressive close-up images, or travel far to find interesting subjects move in closer on the world around you and the possibilities are virtually endless. AUTHOR: Ross is an award-winning wildlife and landscape photographer, the author of several photography books, and a regular contributor to the photo press. Based in North Cornwall, England, Ross is best known for his beautiful macro and close-up images, and for evocative landscape photographs. He co-runs the photography workshop company Dawn2Dusk Photography and also provides bespoke 1-2-1 tuition. As well as judging major nature photography competitions, Ross has been a brand ambassador for leading photography equipment brands including Nikon UK, Manfrotto, and F-stop Gear.

Trust in Computer Systems and the Cloud (Hardcover): M Bursell Trust in Computer Systems and the Cloud (Hardcover)
M Bursell
R874 Discovery Miles 8 740 Ships in 12 - 17 working days

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell's experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing. The book demonstrates in the importance of understanding and quantifying risk and draws on the social and computer sciences to explain hardware and software security, complex systems, and open source communities. It takes a detailed look at the impact of Confidential Computing on security, trust and risk and also describes the emerging concept of trust domains, which provide an alternative to standard layered security. Foundational definitions of trust from sociology and other social sciences, how they evolved, and what modern concepts of trust mean to computer professionals A comprehensive examination of the importance of systems, from open-source communities to HSMs, TPMs, and Confidential Computing with TEEs. A thorough exploration of trust domains, including explorations of communities of practice, the centralization of control and policies, and monitoring Perfect for security architects at the CISSP level or higher, Trust in Computer Systems and the Cloud is also an indispensable addition to the libraries of system architects, security system engineers, and master's students in software architecture and security.

Technology In Action Complete, Global Edition (Paperback, 16th edition): Alan Evans, Kendall Martin, Mary Poatsy Technology In Action Complete, Global Edition (Paperback, 16th edition)
Alan Evans, Kendall Martin, Mary Poatsy
R2,480 Discovery Miles 24 800 Ships in 12 - 17 working days

For introductory courses in computer concepts, digital literacy, or computer literacy, often including instruction in Microsoft (R) Office. Best-selling Technology in Action Complete uses practical content and hands- on projects to engage students in computing tasks and skills they can apply at work, in class, or at home. Designed for today's technically savvy students, the text introduces difficult concepts at a basic level early on, then expands upon these skills as students build mastery. The 16th edition brings innovative content updates, including new coverage of ethics, artificial intelligence, and managing a digital lifestyle, as well as several new features encouraging critical thinking.

Karel the Robot - A Gentle Introduction to the Art  of Object Oriented Programming 2e (SW Mac) (Digital, 2nd Revised edition):... Karel the Robot - A Gentle Introduction to the Art of Object Oriented Programming 2e (SW Mac) (Digital, 2nd Revised edition)
R P Pattis
R849 R141 Discovery Miles 1 410 Save R708 (83%) Ships in 7 - 13 working days

Uses a creative approach to teach the basic skills and concepts of programming quickly. This edition offers excellent insights into problem solving and program design processes. It will also improve comprehension of such computer science considerations as loop invariants and recursion. Includes 60 color line drawings.

Information Technology for Management-Driving Digi tal Transformation to Increase Local and Global Pe rformance, Growth and... Information Technology for Management-Driving Digi tal Transformation to Increase Local and Global Pe rformance, Growth and Sustainability, 12th Edition (Paperback, 12th Edition, International Adaptation)
E. Turban
R1,639 Discovery Miles 16 390 Ships in 12 - 17 working days

Information Technology for Management provides students with a comprehensive understanding of the latest technological developments in IT and the critical drivers of business performance, growth, and sustainability. Integrating feedback from IT managers and practitioners from top-level organizations worldwide, the International Adaptation of this well-regarded textbook features thoroughly revised content throughout to present students with a realistic, up-to-date view of IT management in the current business environment. This text covers the latest developments in the real world of IT management with the addition of new case studies that are contemporary and more relevant to the global scenario. It offers a flexible, student-friendly presentation of the material through a pedagogy that is designed to help students easily comprehend and retain information. There is new and expanded coverage of Artificial Intelligence, Robotics, Quantum Computing, Blockchain Technology, IP Intelligence, Big Data Analytics, IT Service Management, DevOps, etc. It helps readers learn how IT is leveraged to reshape enterprises, engage and retain customers, optimize systems and processes, manage business relationships and projects, and more.

Management Information Systems - Moving Business Forward (Paperback, 4th Edition, EMEA Edition): R.Kelly Rainer, Brad Prince,... Management Information Systems - Moving Business Forward (Paperback, 4th Edition, EMEA Edition)
R.Kelly Rainer, Brad Prince, Hugh J. Watson
R1,336 Discovery Miles 13 360 Ships in 7 - 13 working days
Deep Learning-based Forward Modeling and Inversion Techniques for Computational Physics Problems (Hardcover): Yinpeng Wang,... Deep Learning-based Forward Modeling and Inversion Techniques for Computational Physics Problems (Hardcover)
Yinpeng Wang, Qiang Ren
R2,333 Discovery Miles 23 330 Ships in 9 - 15 working days

This book investigates in detail the emerging deep learning (DL) technique in computational physics, assessing its promising potential to substitute conventional numerical solvers for calculating the fields in real-time. After good training, the proposed architecture can resolve both the forward computing and the inverse retrieve problems. Pursuing a holistic perspective, the book includes the following areas. The first chapter discusses the basic DL frameworks. Then, the steady heat conduction problem is solved by the classical U-net in Chapter 2, involving both the passive and active cases. Afterwards, the sophisticated heat flux on a curved surface is reconstructed by the presented Conv-LSTM, exhibiting high accuracy and efficiency. Besides, the electromagnetic parameters of complex medium such as the permittivity and conductivity are retrieved by a cascaded framework in Chapter 4. Additionally, a physics-informed DL structure along with a nonlinear mapping module are employed to obtain the space/temperature/time-related thermal conductivity via the transient temperature in Chapter 5. Finally, in Chapter 6, a series of the latest advanced frameworks and the corresponding physics applications are introduced. As deep learning techniques are experiencing vigorous development in computational physics, more people desire related reading materials. This book is intended for graduate students, professional practitioners, and researchers who are interested in DL for computational physics.

Kunstliche Intelligenz selber programmieren fur Dummies Junior (German, Paperback): U Schmid Kunstliche Intelligenz selber programmieren fur Dummies Junior (German, Paperback)
U Schmid
R350 Discovery Miles 3 500 Ships in 7 - 13 working days

Sind Maschinen bald schlauer als wir? Haben dann die Roboter das Sagen? Um diese Fragen realistisch beantworten zu kAnnen, musst du erst einmal herausfinden, was KA1/4nstliche Intelligenz eigentlich ist. Dieses Buch hilft dir dabei. Kapitel fA1/4r Kapitel beantwortet es folgende Fragen: Wie denken Computer? Wie lernen Computer? Wie spielen Computer? Wie kannst du mit Computern sprechen? KAnnen Computer fA1/4hlen? Wenn du schon ein bisschen programmieren kannst, wird das alles noch spannender durch die Beispielprogramme in Python, die das Buch enthAlt und mit denen du eigene Experimente zu KA1/4nstlicher Intelligenz machen kannst. Ran an die Tasten! Bestens geeignet fA1/4r Kinder und Jugendliche ab 12 Jahre.

Through Two Doors at Once - The Elegant Experiment that Captures the Enigma of our Quantum Reality (Paperback): Anil... Through Two Doors at Once - The Elegant Experiment that Captures the Enigma of our Quantum Reality (Paperback)
Anil Ananthaswamy
R246 Discovery Miles 2 460 Ships in 12 - 17 working days

How can matter behave both like a particle and a wave? Does a particle exist before we look at it or does the very act of looking bring it into reality? Is there a place where the quantum world ends and our perceivable world begins? Many of science's greatest minds including Thomas Young, Albert Einstein and Richard Feynman have grappled with the questions embodied in the simple yet elusive 'double-slit' experiment in order to understand the fabric of our universe. With his extraordinary gift for making the complicated comprehensible, Anil Ananthaswamy travels around the world and through history, down to the smallest scales of physical reality we have yet fathomed, to reveal the answers.

The Garbage Collection Handbook - The Art of Automatic Memory Management (Hardcover, 2nd edition): Richard Jones, Antony... The Garbage Collection Handbook - The Art of Automatic Memory Management (Hardcover, 2nd edition)
Richard Jones, Antony Hosking, Eliot Moss
R1,885 Discovery Miles 18 850 Ships in 9 - 15 working days

Universally acclaimed as the book on garbage collection. A complete and up-to-date revision of the 2012 Garbage Collection Handbook. Thorough coverage of parallel, concurrent and real-time garbage collection algortithms including C4, Garbage First, LXR, Shenandoah, Transactional Sapphire and ZGC, and garbage collection on the GPU. Clear explanation of the trickier aspects of garbage collection, including the interface to the run-time system, handling of finalisation and weak references, and support for dynamic languages. New chapters on energy aware garbage collection, and persistence and garbage collection. The e-book includes more than 40,000 hyperlinks to algorithms, figures, glossary entries, indexed items, original research papers and much more. Backed by a comprehensive online database of over 3,400 garbage collection-related publications

Behavior and Culture in One Dimension - Sequences, Affordances, and the Evolution of Complexity (Hardcover): Dennis Waters Behavior and Culture in One Dimension - Sequences, Affordances, and the Evolution of Complexity (Hardcover)
Dennis Waters
R4,070 Discovery Miles 40 700 Ships in 12 - 17 working days

* Draws on work across multiple disciplines, from astrobiology and physics to linguistics and the social sciences, making it appealing to graduates from a wide variety of fields. * The first accessible introduction into the important work of philosopher Howard Pattee. * Aims to equip readers with new approaches to simple and complex systems theory to take into any respective discipline.

Advanced Computational Techniques for Sustainable Computing (Hardcover): Megha Rathi, Adwitiya Sinha Advanced Computational Techniques for Sustainable Computing (Hardcover)
Megha Rathi, Adwitiya Sinha
R4,433 Discovery Miles 44 330 Ships in 9 - 15 working days

Provides insight on building smart sustainable solutions Includes details of applying mining, learning, IOT and sensor-based techniques for sustainable computing Entails data extraction from various sources followed with pre-processing of data, and how to make effective use of extracted data for application-based research Involves practical usage of data analytic language, including R, Python, etc. for improving sustainable services offered by multi-disciplinary domains Encompasses comparison and analysis of recent technologies and trends Includes development of smart models for information gain and effective decision making with visualization

Cyberpredators and Their Prey (Paperback): Lauren R Shapiro Cyberpredators and Their Prey (Paperback)
Lauren R Shapiro
R1,495 Discovery Miles 14 950 Ships in 9 - 15 working days

Portrays material through multidisciplinary lens of psychology, criminal justice, law, and security Provides consistent, practical information about online criminals and victims Compares online to offline versions of the same crime Discusses adequacy of current laws for prosecuting cybercriminals Considers elements of the online environment that foster criminal activity Describes social engineering techniques Considers the role of intimate partner violence in cybercrimes Reviews 21st century skills needed to educate and protect potential targets

PKI Implementation and Infrastructures (Hardcover): Julian Ashbourn PKI Implementation and Infrastructures (Hardcover)
Julian Ashbourn
R2,958 Discovery Miles 29 580 Ships in 9 - 15 working days

1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.

Information Processing 2VST (Hardcover): E Katz Information Processing 2VST (Hardcover)
E Katz
R7,122 R5,638 Discovery Miles 56 380 Save R1,484 (21%) Ships in 7 - 13 working days

This set contains the two volumes, Biomolecular Information Processing together with Molecular and Supramolecular Information Processing with contributions from all the major scientists in the field. Edited by a renowned and much cited chemist, the two books cover all the different systems, providing an excellent overview of the latest developments in this rapidly expanding area.
A must-have for all researchers working on this very hot topic.

Software Deployment, Updating, and Patching (Paperback): Bill Stackpole, Patrick Hanrion Software Deployment, Updating, and Patching (Paperback)
Bill Stackpole, Patrick Hanrion
R1,792 Discovery Miles 17 920 Ships in 12 - 17 working days

The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing systems with the latest packs and patches. Written by two of Microsoft's top experts, this clear and concise manual demonstrates how to perform inventories of IT assets, test compatibility, target deployment, and evaluate management technologies. It also shows you how to create and implement your own deployment plans with recovery and remediation options, and how to recognize potential vulnerabilities.

Digital Project Practice for New Work and Industry 4.0 (Paperback): Tobias Endress Digital Project Practice for New Work and Industry 4.0 (Paperback)
Tobias Endress
R1,322 Discovery Miles 13 220 Ships in 9 - 15 working days

New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community. Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how: Industry 4.0 might influence the potential demand for "Digital Unions" Industry 4.0, and lean production, and their applications can change industrial practices Open Banking presents new approaches and new business models Work structures and systems can empower employees' work self-management This book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit. In essence, this book cover appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.

Continuous and Embedded Learning for Organizations (Paperback): Jon M. Quigley, Shawn P. Quigley Continuous and Embedded Learning for Organizations (Paperback)
Jon M. Quigley, Shawn P. Quigley
R1,338 Discovery Miles 13 380 Ships in 9 - 15 working days

There is considerable connection between growth of the personnel in the organization and the ability for the company to compete over time. Looking outside for help training may be required but looking within for opportunities for enhanced training and growth, will foster a continually improving and growing organization. This book examines the opportunities for learning, within the organization and its' activities, along with the connection to motivation. Additionally, it provides information on the characteristics of organizations that are able to quickly disseminate, along with approaches for improving this distribution of that learning throughout the organization.

Practical Core Software Security - A Reference Framework (Paperback): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Paperback)
James F Ransome, Anmol Misra, Mark S. Merkow
R2,257 Discovery Miles 22 570 Ships in 9 - 15 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Software Security - Concepts & Practices (Hardcover): Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan Software Security - Concepts & Practices (Hardcover)
Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan
R3,570 Discovery Miles 35 700 Ships in 9 - 15 working days

Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.

ISE Introduction to Programming with Java: A Problem Solving Approach (Paperback, 3rd edition): John Dean, Ray Dean ISE Introduction to Programming with Java: A Problem Solving Approach (Paperback, 3rd edition)
John Dean, Ray Dean
R1,799 Discovery Miles 17 990 Ships in 12 - 17 working days

Introduction to Programming with Java: A Problem Solving Approach teaches the reader how to write programs using Java. It does so with a unique approach that combines fundamentals first with objects early. The book transitions smoothly through a carefully selected set of procedural programming fundamentals to object-oriented fundamentals. During this early transition and beyond, the book emphasizes problem solving. For example, Chapter 2 is devoted to algorithm development, Chapter 8 is devoted to program design, and problem-solving sections appear throughout the book. The third edition introduces several new Java language features, most of the end-of-chapter GUI sections and the final GUI chapters use JavaFX, and almost all end-of-chapter exercises are new.

Cybertax - Managing the Risks and Results (Paperback): George K. Tsantes, James Ransome Cybertax - Managing the Risks and Results (Paperback)
George K. Tsantes, James Ransome
R492 Discovery Miles 4 920 Ships in 9 - 15 working days

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

Ransomware and Cybercrime (Paperback): Andrew Jenkinson Ransomware and Cybercrime (Paperback)
Andrew Jenkinson
R946 Discovery Miles 9 460 Ships in 9 - 15 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

Digital Intermediation - Unseen Infrastructure for Cultural Production (Paperback): Jonathon Hutchinson Digital Intermediation - Unseen Infrastructure for Cultural Production (Paperback)
Jonathon Hutchinson
R1,096 Discovery Miles 10 960 Ships in 9 - 15 working days

Digital Intermediation offers a new framework for understanding content creation and distribution across automated media platforms - a new mediatisation process. The book draws on empirical and theoretical research to carefully identify and describe a number of unseen digital infrastructures that contribute to a predictive media production process through technologies, institutions and automation. Field data is drawn from several international sites, including Los Angeles, San Francisco, Portland, London, Amsterdam, Munich, Berlin, Hamburg, Sydney and Cartagena. By highlighting an increasingly automated content production and distribution process, the book responds to a number of regulatory debates on the societal impact of social media platforms. It highlights emerging areas of key importance that shape the production and distribution of social media content, including micro-platformization and digital first personalities. The book explains how technologies, institutions and automation are used within agencies to increase exposure for the talent they manage, while providing inside access to the processes and requirements of producers who create content for platform algorithms. Finally, it outlines user agency as a strategy for those who seek diversity in the information they access on automated social media content distribution platforms. The findings in this book provide key recommendations for policymakers working within digital media platforms, and will be invaluable reading for students and academics interested in automated media environments.

The Art of Statistics - How to Learn from Data (Paperback): David Spiegelhalter The Art of Statistics - How to Learn from Data (Paperback)
David Spiegelhalter
R541 R417 Discovery Miles 4 170 Save R124 (23%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Introduction to the Theory of…
Michael Sipser Hardcover R1,239 R1,110 Discovery Miles 11 100
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,183 R1,068 Discovery Miles 10 680
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, … Paperback R1,240 R1,116 Discovery Miles 11 160
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,176 R894 Discovery Miles 8 940
Interaction Design: Beyond…
Rogers Paperback R1,882 Discovery Miles 18 820
Introduction to Computer Theory
Daniel I. A. Cohen Paperback  (4)
R6,075 R912 Discovery Miles 9 120
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, … Paperback R1,174 R1,055 Discovery Miles 10 550
Dynamic Web Application Development…
David Parsons, Simon Stobart Paperback R1,255 R1,126 Discovery Miles 11 260
Nikon D5300
Jon Sparks Paperback R466 R315 Discovery Miles 3 150

 

Partners